法搜网--中国法律信息搜索网
网络社会的信息隐私权保护架构:法律经济分析的初步观察

  ----------------------------------------------------------------------------
  本位作者:美国芝加哥大学法学博士(J.S.D., March 1997);哈佛大学法学硕士(LL.M., June 1994)。现任中央大学产业经济研究所专任助理教授。
  [1] See The Starr Report: The Evidence 437-59 (Phil Kuntz ed., 1998).
  [2] See generally Center for Democracy and Technology, Privacy Advocates Letter on Pentium III (Jan. 28, 1999) (http://www.cdt.org/privacy/intel.letter.html.) (visited Feb. 15, 1999).
  [3] Richard M. Smith, Windows 98 Knows Who You Are, BYTE.COM (March 12, 1999)(http://www.byte.com/features/1999/03/win98priv.html)(visited March 20, 1000)
  [4] Robert O’Harrow, Jr., Fearing a Plague of “Web Bugs”; Invisible Fact-Gathering Code Raises Privacy Concerns, Wash. Post, Nov. 13, 1999, at E01.
  [5] See generally Jerry Kang, Information Privacy in Cyberspace Transactions, 50 Stan. L. Rev. 1193, 1246 (1998).
  [6] See generally Paul M.Schwartz, Privacy and Participation: Personal Information and Public Sector Regulation in the United States, 80 Iowa L. Rev. 553 (1995).
  [7] See generally William H. Minor, Identity Cards and Databases in Health Core: The Need for Federal Privacy Protection, 28 Colum. J.L. & Soc. Probs. 253 (1995).
  [8] See generally James Boyle, Shamans, Software, And Spleens: Law And The Construction Of The Information Society 4-5 (1996);Dan Burk & Jennifer A. Hess, Genetic Privacy: Constitutional Considerations in Forensic DNA Testing, 5 Geo. Mason U. Civ. Rts L. J.1 (1994);Andrea de Gorgey, Comment, The Advent of DNA Databanks: Implications for Informational Privacy, 16 Am. J. L. & Med.381 (1990). See also Lawrence A. Gostin, Health Information Privacy, 80 Cornell L. Rev.451 (1995).
  [9] See generally Symposium: Privacy and ITS, 11 Santa Clara Computer & High Tech. L.J. 1 (1995).
  [10] See generally Lillian R. Bevier, Information About Individuals in the Hands of Government: Some Reflections on Mechanism for Privacy Protection, 3 Wm. & Marry Bill Rts. J. 455 (1995).
  [11] See generally Paul M. Schwartz, Data Processing and Government Administration: The Failure of the American Legal Response to the Computer, 43 Hastings L. J. 1321(1992).
  [12]Andrew L. Shapiro, Privacy for Sale: Peddling Data on the Internet, Nation, June 23, 1997.
  [13] See generally Jeffrey Rothfeder: Privacy For Sale: How Computerization Has Made Everyone''s Life An Open Secret (1992).
  [14] See generally Samuel Warren & Louis Barandeis, The Right to Privacy, 4 Harv. L. Rev. 193 (1890).
  [15] See generally Priscilla M. Regan, Legislating Privacy 26 (1995).
  [16] See generally Laurence H. Tribe, American Constitutional Law Ch. 15 (2nd. Ed. 1988).
  [17] See generally Davis F. Linows, Privacy in America: Is Your Life in the Public Eye (1989).
  [18] Olmstead v. United States, 277 U.S. 438(1928).
  [19] See, e. g., Albert W. Alshuler, Interpersonal Privacy and the Fourth Amendment, 4 N. I11. U. L. REV. 962 (1983);Robert C. Post, Rereading Warren and Brandeis: Privacy, Property and Appropriation, 41 Case Western L. Rev.647 (1991).
  [20] Charles Fried, Privacy [A moral Analysis] , 77 Yale  L. J. 475 (1969) , reprint in Ferdinard D. Schoeman ed., Philosophical Dimensions of Privacy (1984).
  [21] Id.
  [22] See generally Edward J. Bloustein, Privacy as an Aspect of Human Dignity, reprint in Schoeman, supra note 20,at 156.
  [23] See generally Oscar H. Gandy, Jr., Legitimate Business Interest: No End in Sight? An Inquiry of Privacy in Cyberspace, 1996 U. Chi. Legal F. 77 (1996).
  [24] See generally Edward J. Markey, A Privacy Safety Net, Mit Technology Review , Aug/Sept. 1997, at 29.
  [25] Smith v. Maryland, 442 U.S. 735, 744, 745-46 (1979).
  [26] See, e.g., Paul Schwartz, Privacy and Participation: Personal Information and Public Sector Regulation in the United States, 80 Iowa L. Rev. 553 (1995); Spiros Simitis, Reviewing Privacy in an Information Society, 135 U. Pa. L. Rev. 707 (1987).


第 [1] [2] [3] [4] [5] [6] [7] [8] 页 共[9]页
上面法规内容为部分内容,如果要查看全文请点击此处:查看全文
【发表评论】 【互动社区】
 
相关文章